A Study: Cryptology Techniques and Methodologies
Journal Title: International Journal of Science and Research (IJSR) - Year 2013, Vol 2, Issue 12
Abstract
Cryptography, as the most important aspect in the never ending evolving information technology era, is being criticized in its aspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. This paper attempts to define the existing cryptology techniques and measures how strong and
Remotely Counsel and Governing WLAN through Wi-Fi Enabled Android Device
This paper demonstrates how the WIRELESS LAN monitoring and controlling is done through the android phone when administrator is not present at a network place. It is integrated software that allows administrator to remot...
Antimicrobial Efficiency of NaOCL and Helbo Laser against Enterococcus faecalis
Abstract: The aim was to compare the efficacy of antimicrobial therapy, applying photodynamic therapy in different time intervals and the conventional method of irrigation of channel with sodium hypochlorite NaOCl 2.5 %....
Allergic Conjunctivitis as the Initial Ocular Manifestation of HIV in Young/Middle Age Patients [20-40YRS]
"ALLERGIC CONJUNCTIVITIS AS THE INITIAL OCULAR MANIFESTATION OF HIV IN YOUNG/MIDDLE AGE PATIENTS [20-40yrs] ABSTRACT: AIM: To assess the incidence of allergic conjunctivitis as the initial ocular manifestation of HIV in...
Detection of Cysts in Ultrasonic Images of Ovary
In this paper, cysts are detected in the ultrasonic images of ovary. PCOS is an endocrine disorder affecting women of reproductive age. This syndrome is mainly seen in women whose age is in between 25 and 35. We are prop...
Sigma Delta Modulator with Improved Performance through Evolutionary Algorithm
Sigma Delta Modulator with Improved Performance through Evolutionary Algorithm